Search
Info
Warning
Danger

Study Resources (Accounting)

11) An administrator in a company defines who receives what reports, when, and by what means. These functions performed by the administrator are referred to as report delivery. 12) For query reports, the report-delivery system serves as an intermediary between the user and the report generator. 13) In OLAP reports, a dimension.
0 Views
View Answer
1) Social networking communication is long-lasting compared to direct word of mouth. 2) A viral hook is designed to induce current customers to bring their friends to a network. 3) To an organization, the strength of a relationship is the likelihood that the person or other organization in the relationship will do.
0 Views
View Answer
11) Differences in language, culture, norms, and expectations compound the difficulties of international process management. 12) Information systems increase inventories. 13) The bullwhip effect is a phenomenon in which the variability in the size and timing of orders increases at each stage of the supply chain. 14) Information systems support just-in-time (JIT) inventory.
0 Views
View Answer
11) If a distributed database contains copies of the same data, it is called a ________ database. A) mirrored B) redundant C) replicated D) partitioned 12) If a distributed database divides the database into nonoverlapping segments, it is called a(n) ________ database. A) mirrored B) replicated C) independent D) partitioned 13) Which of the following is an advantage.
0 Views
View Answer
1) Database marketing is the application of business intelligence systems to the planning and execution of marketing programs. 2) Data-mining techniques are essential for database marketing. 3) The RFM score is obtained by ranking the customers on the basis of pricing patterns. 4) The RFM score of customers is obtained by multiplying their.
1 Views
View Answer
Exercises 1) Parrot Incorporated purchased the assets and liabilities of Sparrow Company at the close of business on December 31, 2011. Parrot borrowed $2,000,000 to complete this transaction, in addition to the $640,000 cash that they paid directly. The fair value and book value of Sparrow's recorded assets and liabilities as.
0 Views
View Answer
11) A datum is a set of elevations based on particular values of the earth's ________. A) circumference B) diameter C) area D) radii 12) A ________ is a technique for placing locations on the surface on the earth onto a flat surface. A) geofence B) datum C) geocoding D) map projection 13) Which of the following factors are geographic.
0 Views
View Answer
1) The development of large-scale systems can involve integrating products and services from different companies. 2) Large-scale systems development projects require the balancing of three critical drivers: requirements, cost, and time. 3) The trade-off between time and cost is a simple process; the time involved in a project can always be.
0 Views
View Answer
1) What is a reporting system? What are the operations performed by them? 2) How does a reporting system obtain the necessary data to generate reports? 3) What are the different types of reports? Explain. 4) What is the difference between push and pull reports? 5) Explain report authoring, management, and delivery. 6) Describe online.
2 Views
View Answer
3) At December 31, 2011, Pandora Incorporated issued 40,000 shares of its $20 par common stock for all the outstanding shares of the Sophocles Company. In addition, Pandora agreed to pay the owners of Sophocles an additional $200,000 if a specific contract achieved the profit levels that were targeted by.
0 Views
View Answer
11) Which of the following types of reports is an example of a push report? A) static report B) dynamic report C) query report D) OLAP report 12) Creating the report structure and formatting the report are a part of ________. A) report management B) report authoring C) report pitching D) report delivery 13) The purpose of ________ is to.
0 Views
View Answer
1) What is a social networking information system? 2) What is a social networking group? What are the different types of social networking groups available? 3) Explain Facebook's principles of meaningful social networking applications. 4) What are the business applications for user-generated content in social networking? .
1 Views
View Answer
1) If the customer's request for special terms is disapproved the cost of checking availability and credit is wasted. 2) A substantial change in the business environment like the onset of a recession might mean that checking credit becomes unnecessary. 3) Organizations can plan to develop and modify business processes, in which.
0 Views
View Answer
11) Encapsulation is a design practice that places the logic in one place; all other services go to that one place for that service. 12) Service providers reject improperly formatted service requests and provide only properly formatted service responses. 13) The general principles of SOA can be used for designing business activities.
0 Views
View Answer
11) In the existing business order process, ________ represent decisions and usually contain a question that can be answered with yes or no. A) squares B) dotted arrows C) diamonds D) solid arrows 12) Process designers can change the ________ of a business process without changing resource allocations. A) purpose B) objective C) function D) structure 13) The two major.
2 Views
View Answer
1) Reporting systems cannot generate reports that require calculations on the data. 2) Data generated from public sources is a component of reporting systems. 3) Ordinal data is used to describe reports, users, groups, roles, events, and other entities involved in the reporting activity. 4) Reporting systems use dedicated indexing systems instead of.
0 Views
View Answer
1) What are the management advantages of outsourcing? 2) How can outsourcing reduce risk? 3) What are the popular outsourcing alternatives? 4) Describe in brief the risks related to the loss of control that may result from outsourcing. 5) Outsourcing does not offer the hiring company an easy exit from the agreement with.
0 Views
View Answer
1) Which of the following is true regarding the international business scenario in the twentieth century? A) After the dot-com bust, optical fiber was extremely scarce and expensive. B) After the fall of the Soviet Union, the economies of Russia and western-Europe closed their markets to the world. C) The economies of North.
2 Views
View Answer
11) It is not yet possible to outsource entire business functions. 12) In time, there is a risk that the outsource vendor will become the de facto sole source for the company. 13) Outsourcing protects companies from a potential loss of intellectual capital. 14) Although the fixed cost achieved through outsourcing does.
0 Views
View Answer
1) GIS is an information system that captures, stores, analyzes, and displays ________ data. A) geospatial B) geosynchronous C) geological D) geometric 2) ________ employ GIS to help solve a problem. A) Developers B) Field personnel C) Business intelligence users D) Operations personnel 3) ________ run and maintain the GIS. A) Field personnel B) Casual users C) Developers D) Operations.
2 Views
View Answer
1) Just about any business activity in the value chain—from marketing and sales to logistics, manufacturing, and customer service—can be outsourced. 2) Outsourcing, by definition, refers to the use of a foreign vendor. 3) IT and IS services cannot be outsourced by a company. 4) Some companies choose to outsource to save.
0 Views
View Answer
1) Geospatial data means data that can be ordered in reference to the earth. 2) GIS creates information by manipulating and displaying data in a geospatial context. 3) Currently, all GIS applications run on classic client-server applications. 4) GIS employs special purpose hardware for capturing geospatial data. 5) Application-specific programs are different from application.
0 Views
View Answer
1) Which of the following tools is used to create meaningful information from disparate data sources and to deliver that information to the proper user on a timely basis? A) authoritative systems B) reporting systems C) monitoring systems D) intelligence systems 2) Which of the following reporting system functions will come useful if a.
2 Views
View Answer
Multiple Choice Questions 1) Which of the following is not a reason for a company to expand through a combination, rather than by building new facilities? A) A combination might provide cost advantages. B) A combination might provide fewer operating delays. C) A combination might provide easier access to intangible assets. D) A combination might.
1 Views
View Answer
1) A(n) ________ is a collection of business records. A) ledger B) repository C) account D) data flow 2) Which of the following is the first step in processing an order? A) checking customer credit B) approving special terms C) verifying availability D) preparing quotation 3) Why is customer credit checked before checking availability of goods? A) for the smooth working.
7 Views
View Answer
11) In marketing transactions, the fact that customers who buy product X also buy product Y creates a(n) ________ opportunity. A) relationship selling B) cross selling C) value added selling D) persuasive selling 12) In market-basket terminology, ________ is the term used to represent the probability that two items will be purchased together. A) confidence B) support C).
2 Views
View Answer
11) A microblog is a Web site on which users can publish their opinions without any restrictions. 12) Microblogging is more daunting compared to blogging. 13) Web sites that produce ratings and surveys are examples of UGC applications. 14) Wikis and blogs do not contain user-generated content. 15) Technologies such as e-commerce and Web.
0 Views
View Answer
1) ________ is the hiring of another organization to perform a service. A) Insourcing B) Merchandising C) Poaching D) Outsourcing 2) Which of the following is an advantage of outsourcing? A) It allows the organization greater control. B) It guarantees quality and risk reduction. C) It can be an easy way to gain expertise. D) It allows for an.
3 Views
View Answer
1) ________ refers to any activity that an entity (individual, project, or organization) takes with entities with which it is related. A) Knowledge tagging B) Social networking C) Enterprise bookmarking D) Lateral diffusion 2) The something that induces people to share your message is called a(n) ________. A) M score B) OLAP cube C) viral hook D) datum 3) The.
4 Views
View Answer
1) Systems development projects require the balancing of three critical drivers: requirements, cost, and ________. A) scope B) time C) performance D) value 2) The plan, or ________, of a project stipulates the tasks to be accomplished, the labor, and other resources assigned to those tasks, and the schedule for completion. A) baseline B) data model C).
2 Views
View Answer
11) Flashlight Films has outsourced its internet and social media marketing campaigns. This is an example of how companies can outsource ________. A) computer hardware B) computer software C) entire applications D) entire business functions 12) Which of the following is a disadvantage of outsourcing? A) loss of control B) inability to ensure a certain level of.
1 Views
View Answer
11) Twitter is a(n) ________ application. A) Oracle B) Web 2.0 C) TCP/IP D) mashup 12) A ________ is a Web site on which users can publish their opinions in restricted amounts of text. A) vlog B) webcast C) microblog D) podcast 13) Which of the following is true about microblogging? A) The character limitation in microblogging forces one to abbreviate.
2 Views
View Answer
11) With respect to goodwill, an impairment A) will be amortized over the remaining useful life. B) is a two-step process which analyzes each business reporting unit of the entity. C) is a one-step process considering the entire firm. D) occurs when asset values are adjusted to fair value in a purchase. Use the following.
0 Views
View Answer
11) A(n) ________ is a hierarchy of the tasks required to complete a project. A) baseline B) work-breakdown structure C) reliable analysis D) V-Model 12) With respect to WBS, ________ means to define the system boundaries. A) Gantt chart B) critical path C) baseline D) scope 13) _________ concerns contracts with outside vendors for services, materials, and outsourcing of functions. A).
0 Views
View Answer
1) Which of the following marketing techniques refers to the application of business intelligence systems to the planning and execution of marketing programs? A) ambush marketing B) viral marketing C) database marketing D) guerrilla marketing 2) Which of the following is a way of analyzing and ranking customers according to their purchasing patterns? A) composite forecasts B).
4 Views
View Answer